Journals in DBLP
Harold Joseph Highland Random bits & bytes. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:200-209 [Journal ] Belden Menkus Concerns in computer security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:211-215 [Journal ] Bernard P. Zajac Jr. Cost-effectiveness of anti-viral software. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:217-226 [Journal ] Harold Joseph Highland The security impact of networks, telecommunications, and office automation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:227-232 [Journal ] Wayne Madsen Government-sponsored computer warfare and sabotage. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:233-236 [Journal ] Ian G. Graham , St. H. Wieten The PC as a secure network workstation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:237-244 [Journal ] George I. Davida , Yvo Desmedt Passports and visas versus IDs. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:253-258 [Journal ] Martin S. Olivier , Sebastiaan H. von Solms Building a secure database using self-protecting objects. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:259-271 [Journal ] Eugene H. Spafford OPUS: Preventing weak password choices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:273-278 [Journal ]